6 “Legacy system’ is “a previous or outdated system.” Opening Claim Construction Brief [#44] at 8 (defining “legacy system” as an agreed term). 7 “Atomic” is “extremely minute.” See dictionary.com/browse/atomic (definition #4). Here, Plaintiff essentially appears to be stating that a primitive event is single, or individual, event.
in a designated lane, a package left behind in an area, a person screaming, glass breaking, or a gunshot. Id. The primitive events are then normalized by the normalization engine.8 Id. ¶ 10. The normalization engine normalizes the primitive events into a “normalized event 115,” which is in a standardized format the system can recognize. Id. The specification9 points
out that each type of sensory device may have its own normalization engine, or, instead, one normalization engine, as shown in Figure 1 above, may have multiple modules10 for each type of sensory device. Id. In the described embodiment, normalized events 115 are placed in event queue 116 for processing by correlation engine 117. Id. ¶ 11. The basic function of the correlation engine is to correlate two or more primitive events, combinations of primitive events and compound events, and combinations of compound events. Id. Carrying out this function is complex. Id. Figure 2 here shows how the correlation engine works in one embodiment of the invention:
8 “Normalization” is “the process of organizing data in a database.” See https://learn.microsoft.com/en-us/office/troubleshoot/access/database-normalization-description; see also csrc.nist.gov/glossary/term/normalize (defining “normalize” as “[t]he process by which differently formatted data is converted into a standardized format and labeled consistently”); csrc.nist.gov/glossary/term/normalization (defining “normalization” as “[c]onverting each log data field to a particular data representation and categorizing it consistently”).
9 A “specification” is “[t]he part of a patent application describing how an invention is made and used, the best mode of operation of the claimed invention, and the inventor’s claims.” Black’s Law Dictionary (11th ed. 2019).
10 A “module” is a “part of a [computer] program that performs a distinct function.” See dictionary.com/browse/module (definition #6a). 5
216-. Sf mee □ 204, 206s. 208, 210-249 a ata} 1 | |) lol lel iT | | lai fal ah | 181 [ay] 1 fz! i i is} jai (| he g_ 8} i isl fel (2) fal ig) fal ig] e z Zz} | 18 | 16) (2) (fi [mi i [GL eh a zi | [> eI m ‘ a7 = zoe aL aL et aLeLis! a a (gf i lz ue ariel tare 8 aio: fal | ‘Bi ola); zi 3 ae) i ‘| | |3 2 Sl") | | fal ig} |g] | (2 8 ' |* | = | : ee aun “TT at ast at A SOEATONENONE nene endl 117 an! eq 3 secs 5 | EVENTS fo : aaa 118 - DB i ee 122-0 Id. As described by the specification, the correlation engine receives normalized events from the normalization engine. /d. ]12. These normalized events are then filtered by a privacy filter 204, which applies a set of privacy rules defined by a system administrator. /d. For example, a privacy rule may instruct the system to ignore all primitive events between certain time periods, or to disregard other categories of data. Id. After applying the privacy filter, the correlation engine applies the business filter, which applies a set of business rules set by a system administrator. /d. 9 13. The objective of the business filter is to eliminate unnecessary false alarms by disregarding events when they are not significant based on normal business processes. /d. For example, in a security system designed to guard a data center, a business filter could be configured to ignore primitive events taking place during hours when the data center is scheduled to be serviced. /d.
After the correlation engine has filtered primitive events based on the privacy and business rules, it evaluates the remaining primitive events for the presence of “compound events”—events that are composed of one or more primitive events. Id. ¶ 14. An example of a compound event is tailgating, i.e., where two or more persons enter a designated area as detected on the video data using a person-counting algorithm, when only one
corresponding swipe/access card is detected by the legacy access control system. Id. Compound events may include primitive events from one sensor, from two or more sensors, or even from two disparate types of sensors. Id. Next, the correlation engine uses a “correlation module 210” to correlate both the primitive and compound events across geographical space. Id. ¶ 15. For example, the correlation engine may identify multiple tailgating events in different parts of a facility, or the loitering of two different vehicles in different parts of a campus. Id. The correlation module also correlates events across time, by comparing events detected presently with events detected in the past. Id. Examples include detection of the presence of the same
individual allowing another to tailgate at different times, or the same person loitering or being stopped multiple times by security. Id.
The correlation engine’s forensic analysis of events is depicted in greater detail in Figure 10 of the specification:
ts 3 oN “a f ia \ Speke 3) | ox)
1028 Mg Wy oN a DY AL, \ a Len ef \ OT EF Wa S100 wy Wi oN “Ce af SL, FOI RET
ld. 16. This figure depicts various sets of video data (i.e., V1 through Vi; the large circles in the first column), with each subset corresponding to data obtained from a particular video camera. /d. The dashed circles inside Vi through Vi each represent a subset of video data. /d. This figure also depicts various sets of meta-data (i.e., M1 through Mi; the large circles in the second column). /d. 17. Each set of meta-data is indexed and points to at least one set of video data. /d. As depicted in this figure, each set of meta-data corresponds to one and only one set of video data, but the relationship between meta- data and video data may be one-to-many, many-to-one, as well as many-to-many. /d. Finally, Figure 10 depicts various sets of attribute weight data (i.e., W1 through Wi; the large circles in the third column). /d. 18. The sets of attribute weight data are sets of vectors which represent weights associated with subsets of the meta-data M1. /d.
These weights may be multi-dimensional. /d. For example, a two-dimensional weight may represent the attribute weights associated with (i) the reliability of a particular video camera for motion detection, and (ii) the reliability of that camera for gunshot detection. Id. This would enable the system to account for the fact that a camera might have high motion detection reliability and low gunshot detection reliability, or vice-versa. /d. The specification provides an equation that can be used for determining weights for attribute data: Ww; = » (Oe Ap k=]
Id. In this equation, the weights “wi” may be a weighted average of attribute data (ai). /d. The symbol “wx” refers to relative weights of the attributes (ax), which are themselves weights associated with the data sources. /d. The specification further discusses how attribute weights may be recalculated to yield the weighted attribute data of (i) two or more events occurring substantially simultaneously, or (ii) any of two or more events occurring substantially simultaneously. Id. 19. Respectively, the formulae are as follows: (i) W(Min □□□ = W(M2) - W(Me2) (ii) W(M1UM2) = W(M2) + W(M2) - W(Mi) - W(M2) Id.
As the compound events and correlated events are detected, the correlation module stores them in the events database 118. /d. 20. The data may be stored in an events table such as the following Table 3:
TABLE 3 Events table MDEntryID MDParameterID MD_Event_DateTime MD_Event_Duration SreID Sre_Description Sre_Location 432 6 Sep. 27, 2007 1:05 1 Camera 1 Lobby 7:05:24PM 433 16 Sep. 27, 2007 0:01 1 Camera 1 Lebby 7:10:18PM 434 11 Sep. 27, 2007 0:01 9 Card Reader in Server Room 8:13:08PM Server Room 435 10 Sep. 27, 2007 0:02 4 Camera 34 Server Room 8:13:10PM 436 10 Sep. 27, 2007 0:02 4 Camera 34 Server Room 8:13:14PM 437 12 Sep. 27, 2007 0:06 4 Camera 34 Server Room 8:13:24PM 438 14 Sep. 27, 2007 0:26 23 Registered Off-campus 9:05:00PM Student (River St.) 439 15 Sep. 27, 2007 0:10 2 Camera 2 Parking Lot 9:14:04PM
Id. Here, the column “MDEntryID” contains the unique identifiers of the events. /d. “MDParameter|ID” refers to the types of events that were detected, which are fully described in a separate Meta-data parameters table. /d. An example of a Meta-data parameters table is as follows in Table 1:
TABLE 1 Meta-data parameters table MDParametersID Nickname MDtTypeID SrcID MD_TimeStartt MD_TimeEnd 6 Motion in Camera 1 1 1 17:00 8:00 ‘10 Person Enters Server Room 23 , 0:00 23:59 11 Swipe Card Detected to Server Room 22 9 0:00 23:59 12 Tailgating 24 4 0:00 23:59 13 Anonymous Video Tip 98 22 0:00 23:59 14 Registered Student Video Tip 98 oo 0:00 23:59 15 Stolen Plate 99 2 17:00 8:00 16 Camera 1 loses connection 105 1 0:00 23:59 Id. Here, the “MDParameters|D” column contains the unique identifiers of the meta-data parameter, and “MDTypelD” refers to the Meta-data types, which are fully described in a separate Meta-data types table. /d. The “SrclD” column refers to the Sources table, which describes the devices (such as video cameras and card readers) used by the correlation engine. /d. The specification provides a number of examples to illustrate the functionality of the Meta-data parameters table and its relationship among the other tables. /d. One example is as follows: [T]he row “MDParameters|D=6” corresponds to an event with a nickname “Motion in Camera 1.” This event has “MDTypelD=1”, which by examining Table 2 corresponds to a motion event. It has “SrclID=1”, which by examining Table 4 corresponds to Camera 1 located in a lobby. Based on “MD_TimeStart” and “MD_TimeEnd”, this event is only being monitored and recorded between the hours of 5:00 PM (17:00) and 8:00 AM (8:00) to protect privacy or to follow a business rule. Id. When the rule evaluation module 214 retrieves the events in the events database, it does so in accordance with a set of rules from a rules database 216. /d. 421. An exemplar Rules table from the rules database is depicted as follows in Table 5:
TABLE 5 Rules table RuleID Nickname MDParamterID ThresholdValue ContactID MsgTxt 1 Alert 1 6 null 4 Motion in lobby during forbidden hours 2 ‘Tailgating SR 12 null 1 Tailgating in server room 3 Global Alert null 61 7 Null Stolen Plate 15 null 2 Stolen plate detected in parking lot 5 Camera 1 16 null null Camera 1 has lost connection! goes down
Id. An exemplar description of an alert defined in Table 5 is provided by the specification: In the sample Rules table shown in Table 5, “AlertID’[''] is a primary key uniquely identifying each rule, “Nickname” provides a nickname for each rule, “MDParameterlD” specifies which event (including primitive or compound events) . . . triggers the alert (or null if a system-wide alert), “ThresholdValue” specifies a threshold value which triggers an alert (for correlated system-wide alerts, or null if an event-based alert), “ContactID” specifies the group, or individual, that will receive the alert, or the set of actions that will be triggered by the alert, and “MsgTxt” specifies the text of the message sent on an alert. “ContactID” is a foreign key into another table (not shown) that specifies the list of recipients or the list of actions to be performed when the alert corresponding to “ContactID” is triggered. Id. The above description of the database tables is only a summary. /d. J 22. The specification’s “Database Design” section describes in great detail these and various other database tables, as well as the relationships among them. /d.
11 As far as the Court is able to determine, “AlertID” appears to be a scrivener’s error which actually refers to the “RulelD” heading of the first column in Table 5. This apparent error appears to have been made in all three of the patents at issue here. See, e.g., [#1-3] at 31-32 (the 616 Patent); [#1-4] at 35 (the ’744 Patent); [#1-5] at 33 (the 314 Patent). 12
Based on the evaluation of rules by the rule evaluation module 214, the correlation engine issues alerts or performs other appropriate actions. /d. 23. These alerts may be issued in real-time in response to the correlation exceeding a particular threshold. /d. Sets of specific conditions may also be specified, and alerts and other actions can be configured to be triggered only when a certain set of conditions are met. /d. Further, actions can be configured to be triggered based on accumulated value of multiple events across space and time. /d. 24. Although the specification provides that various equations may be used, it provides three examples of such equations:
i=N m a: Diwiexi +) = 7 i=l al =n m ag: Yiwiexi + >) wiv; 2 7 al sl
i=N m ay: Swix + >) = Tn i= ial
Id. In these equations, “a” indicates an action, “w’ indicates attribute weights, “x” indicates non-video events, and “v” indicates video events. /d. These equations could represent a hierarchy of actions that would be activated for different threshold scenarios. /d. The Asserted Patents also describe a Hierarchical Storage Manager (“HSM”) for intelligent storage of large volumes of data created by security and surveillance applications, as shown in the illustration below. /d. J 25.
400 a 401 ; HIERARCHICAL STORAGE MANAGER). ag ' “4 p02 i □□□ 410 416 gig EL geek i if | i { SM -- 428 i | C : gan QD | | wl SI ap LDATAIN: 33 a 3 Qo} 402 | S| eee i i | rm pl ot 432 4 105 i > b 5 re = ; (3 Sg wl Z hel Slee! 2 = i bs a z i 3 ' 1 ps a @ = = ee DATA REQUEST IN! 3 7 & a 2B | a 404 iig 3 C DATA OUT! 1 O = = =| jm) fa] | “434 406 5 | m z So] i ° i i Q = \go9 i ye Mm ov é i 1 wee ; | pe i a i we i------- TT 440~ at Mcang “424 EVENTS | SOURCES DB VIDEO DB (ATTRIBUTE DATA)| | MANAGEMENT) “~~ 44 4 DB
118 aay
Id. The HSM resolves a problem that arises from the sheer volume of sensor data in smart surveillance systems. /d. Routine operation of the sensors in the claimed invention generates large amounts of data. /d. For example, a typical 3-Mega-pixel digital surveillance camera generates images of approximately 280 kilobytes per second per frame. If the camera were running at 5 frames per second, it would generate approximately 60 gigabytes per day. In a typical application having 100 surveillance cameras around a particular facility, this translates to 6 terabytes per day or approximately 2,000 terabytes per year. /d. Ideally, requested data should be retrieved at the fastest rate, and this is possible only if all of the data is available on high-speed devices at all 14
times; this is beyond the ability of most organizations. Id. HSM enables data to be moved from a faster storage medium (like cache12) to a slower storage medium (such as tape). Id. One of the benefits of hierarchical storage is that performance is improved as unused data is moved to lower-level storage devices and frees up higher level (faster) storage devices, thus increasing overall system performance. Id. The Patent discloses particular
ways of “cascading” storage. Id. One embodiment is illustrated by video data. Id. ¶ 26. A video data segment is stored by its importance (“Y”), which may be calculated as weighted attributes of the data (including attributes of the camera). Id. Such attributes include resolution of the data (“R”); reliability of the source (such as whether derived from a “video tip”, “RS”); age of camera (“A”); location of camera (“L”); time since video was last accessed (“TS”); time of collection (“TM”) and whether the data includes a “primitive event,” along with attributes of the data. Id. As previously noted, a “primitive event” is an atomic, indivisible event from any subsystem, such as, for example, people entering a designated area, a package
left behind in an area, a gunshot detected, a count of the number of cleaning people entering a building at a certain time, or locks on gates not engaged. Id. The importance of the video data segment may be calculated as a weighted average, as shown in the following equation, where 𝑎𝑖 is the attribute of the data and 𝑤𝑖 is the relative weight:
12 In computer terminology, a “cache”, also called “cache storage,” is “a temporary storage space or memory that allows fast access to data.” See dictionary.com/browse/cache (definition #3). 15
i=N Y =D wiai i=1 Id. 27. For example, in a case of six attributes to a particular video data segment, each weighted equally, the importance is calculated as “Y=(L+tR+tA+RS+TM+TS)/6.” Id. □ 28. Depending on the value of Y, the video data may be stored in the highest or other lower storage hierarchy. /d. When a given hierarchical level becomes nearly full, the video segments of lowest importance are automatically cascaded to free space to accommodate new data. /d. A HSM 401 manages the storage of the video data segments and their corresponding locations. /d. The stored events may be later queried and retrieved from the appropriate hierarchy and migrated to a faster location for processing. /d. The HSM system is complex and implements the following functions and sub- systems or a sub-set thereof, as described in detail in the patent: (a) storage hierarchy including on-site and off-site (network or cloud based) storage of various speeds and cost; (6) HSM Migration: data migration policy between different levels codified by preset mathematical rules or operator override; (c) HSM Archiving: archival of data to slower or remote storage based on importance or frequency of use; (d) HSM Rules Engine: automated control or change of data storage location based on predefined policy rules being triggered; and (e) HSM Audit Trails: storage of an audit record including information about each data access event to enhance data privacy. /d. | 29. In summary, the HSM
provides a detailed formal design and framework of operation to handle the large amounts of data produced by security and surveillance systems. Id. In the present Motion [#39], Defendant moves for judgment on the pleadings pursuant to Fed. R. Civ. P. 12(c), arguing that the asserted patents are invalid under 35 U.S.C. § 101, because (1) they are directed to the abstract idea of collecting data from
sensors, storing the data in storage devices, analyzing the collected data, and providing an alert in response to the results of the data analysis, and (2) there is no “inventive concept” underlying the asserted claims to make them patent-eligible. Motion [#39] at 1, 20. II. Standard of Review Fed. R. Civ. P. 12(c) provides: “After the pleadings are closed—but early enough not to delay trial—a party may move for judgment on the pleadings.” “Judgment on the pleadings should not be granted ‘unless the moving party clearly established that no material issue of fact remains to be resolved and the party is entitled to judgment as a
matter of law.’” Park Univ. Enters., Inc. v. Am. Cas. Co., 442 F.3d 1239, 1244 (10th Cir. 2006) (citation omitted). A motion for judgment on the pleadings made pursuant to Rule 12(c) is reviewed under the same legal standard as a motion for failure to state a claim made pursuant to Fed. R. Civ. P. 12(b)(6). Mock v. T.G. & Y Stores Co., 971 F.2d 522, 528 (10th Cir. 1992). The Rule 12(b)(6) standard tests “the sufficiency of the allegations within the four corners of the complaint after taking those allegations as true.” Mobley v. McCormick, 40 F.3d 337, 340 (10th Cir. 1994); Fed. R. Civ. P. 12(b)(6) (stating that a complaint may be dismissed for “failure to state a claim upon which relief can be granted”). “The court’s 17
function on a Rule 12(b)(6) motion is not to weigh potential evidence that the parties might present at trial, but to assess whether the plaintiff’s complaint alone is legally sufficient to state a claim for which relief may be granted.” Sutton v. Utah State Sch. for the Deaf & Blind, 173 F.3d 1226, 1236 (10th Cir. 1999) (citation omitted). To survive a Rule 12(b)(6) motion, “[t]he complaint must plead sufficient facts, taken as true, to provide ‘plausible
grounds’ that discovery will reveal evidence to support plaintiff’s allegations.” Shero v. City of Grove, Okla., 510 F.3d 1196, 1200 (10th Cir. 2007). That is, a complaint must include “enough facts to state a claim to relief that is plausible on its face.” TON Servs., Inc. v. Qwest Corp., 493 F.3d 1225, 1235 (10th Cir. 2007). “A claim has facial plausibility when the plaintiff pleads factual content that allows the court to draw the reasonable inference that the defendant is liable for the alleged misconduct.” Ashcroft v. Iqbal, 556 U.S. 662, 678 (2009). Moreover, “[a] pleading that offers labels and conclusions or a formulaic recitation of the elements of a cause of action will not do, [n]or does the complaint suffice if it tenders naked assertion[s] devoid of further factual enhancement.”
Id. (internal quotation marks omitted). III. Analysis A. Legal Framework Patent invalidity is an affirmative defense to an infringement claim. Commil USA, LLC v. Cisco Sys., Inc., 575 U.S. 632, 644 (2015). The Patent Act defines what subject matter is eligible for patent protection: “Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title.” 35 U.S.C. § 101. “Following examination by the Patent and 18
Trademark Office, a duly issued patent is presumed valid . . . .” Interconnect Planning Corp. v. Feil, 774 F.2d 1132, 1139 (10th Cir. 1985). “This statutory presumption derives in part from recognition of the technological expertise of the patent examiners.” Id. Despite this presumption, the Court is obligated “to reach an independent conclusion” as to the validity of the patent. Id. The burden of proving that a patent is invalid “resides
with the person challenging its validity.” Id. (citing 35 U.S.C. § 282). “Patent eligibility under 35 U.S.C. § 101 is a question of law that may contain underlying issues of fact.” CardioNet, LLC v. Infobionic, Inc., 955 F.3d 1358, 1367 (Fed. Cir. 2020). “Accordingly, the § 101 inquiry is properly raised at the pleading stage if it is apparent from the face of the patent that the asserted claims are not directed to eligible subject matter.” TakaDu Ltd. v. Innovyze, Inc., No. CV 21-291-RGA, 2022 WL 684409, at *3 (D. Del. Mar. 8, 2022) (citing Cleveland Clinic Found. v. True Health Diagnostics LLC, 859 F.3d 1352, 1360 (Fed. Cir. 2017), cert. denied, 138 S. Ct. 2621 (2018)). “The inquiry is appropriate at this stage “’only when there are no factual allegations that, taken
as true, prevent resolving the eligibility question as a matter of law.’” TakaDu Ltd., 2022 WL 684409, at *3 (quoting Aatrix Software, Inc. v. Green Shades Software, Inc., 882 F.3d 1121, 1125 (Fed. Cir. 2018)). “In addressing this question, the Court may only look to allegations in ‘the sources properly considered on a motion to dismiss, such as the complaint, the patent, and materials subject to judicial notice.’” Interactive Wearables, LLC v. Polar Electro Oy, 501 F. Supp. 3d 162, 170 (E.D.N.Y. 2020) (quoting Aatrix, 882 F.3d at 1128). Section 101 “contains an important implicit exception: Laws of nature, natural phenomena, and abstract ideas are not patentable.” Ass’n for Molecular Pathology v. 19
Myriad Genetics, Inc., 569 U.S. 576, 589 (2013) (internal quotation marks and brackets omitted). “Accordingly, in applying the § 101 exception, we must distinguish between patents that claim the building blocks of human ingenuity and those that integrate the building blocks into something more, thereby transforming them into a patent-eligible invention.” Alice Corp. v. CLS Bank Int’l, 573 U.S. 208, 217 (2014) (internal citations,
quotation marks, and alterations omitted). The Court’s analysis to determine what is and what is not patentable proceeds in two steps. Id. “First, we determine whether the claims at issue are directed to one of those patent-ineligible concepts.” Id. If the answer is No, then the claims are patent eligible under § 101, and the Court need not reach step two. CardioNet, LLC, 955 F.3d at 1371; TakaDu Ltd., 2022 WL 684409, at *6. However, if the answer at step one is Yes, then the Court proceeds to the second step, which asks: “What else is there in the claims before us?” Id. To answer that question, we consider the elements of each claim both individually and as an ordered combination to determine whether the additional elements transform the nature of the claim into a patent-eligible application. We have described step two of this analysis as a search for an “inventive concept”—i.e., an element or combination of elements that is sufficient to ensure that the patent in practice amounts to significantly more than a patent upon the ineligible concept itself.
Id. at 217-18 (internal citations, brackets, and quotation marks omitted). B. Application of Alice For Defendant to succeed on its Motion [#39], it must first show that the asserted patents are directed to a patent ineligible abstract idea under Alice step one. Alice, 573 U.S. at 217. Then, Defendant must show that the abstract idea does not contain an inventive concept adequate to transform the abstract idea into patentable subject matter 20
under Alice step two. Id. Here, the Court assumes for purposes of adjudicating the present Motion [#39] that Defendant has successfully met the first step. However, even assuming such, the Court finds that the Motion [#39] must be denied under Alice step two, for the reasons explained below. Throughout its briefing, Defendant relies heavily on SecureNet Solutions Group,
LLC v. Senstar Corp., No. 19-cv-02913-NRN, 2020 WL 2557625 (D. Colo. May 20, 2020). Motion [#39] at 1. On October 14, 2019, Plaintiff here filed suit against Senstar Corporation, alleging infringement of U.S. Patent Nos. 7,737,837, 8,013,738, 8,130,098, 8,354,926, and 8,730,040 (collectively, the “Related Patents”). The latter four of the Related Patents are all within the same patent family as the Asserted Patents in the present case. Motion [#39] at 2 n.3. Although Plaintiff does not agree with the entirety of the Senstar court’s holdings, Plaintiff does not contest the relationship between the Related Patents in Senstar and the Asserted Patents in this case. Response [#48] at 34. Senstar filed a motion to dismiss for failure to state a claim pursuant to Fed. R. Civ.
P. 12(b)(6), based on the purported invalidity of the Related Patents under 35 U.S.C. § 101. Motion [#39] at 2. In short, Senstar argued that, while the Related Patents are related to security and surveillance systems, they are actually directed to the abstract idea of collecting data from sensors, analyzing the data, and taking action in response to the result of the data analysis—actions that soldiers, police officers, sentries, and other types of security guards have been performing “since time immemorial.” Senstar, 2020 WL 2557625, at *14. In response, Plaintiff argued that its inventions improve existing computerized surveillance systems by correlating events and weighing the associated data; that the Related Patents constitute improvements in the field of computerized 21
surveillance systems by implementing the Hierarchical Storage Manager; and that the use of attribute data of sensors to reduce error rate is a concrete solution to a real-world problem in assigning reliability to sensors that are unequal in data quality based on a multitude of technical factors. Id. These arguments are essentially identical to those made in the present lawsuit.
Ultimately, the Senstar court found at Alice step one that the Related Patents (from which the Asserted Patents in this case claim priority) are directed to an abstract idea.13 Id. at 1. At Alice step two, the Senstar court determined that the motion could not be granted given the sources the court may consider on a motion to dismiss and because doing otherwise would require a factual determination regarding whether there was an inventive concept present that could transform the claims into ones that were patent- eligible. Senstar, 2020 WL 2557625, at *12; see Aatrix Software, Inc., 882 F.3d at 1128 (stating that, under Alice step two, “[w]hether the claim elements or the claimed combination are well-understood, routine, [or] conventional is a question of fact”).
In the present Motion [#39], Defendant argues that the Alice step two factual issues identified by the Senstar court, which caused the motion to dismiss based on patent ineligibility to be denied, are here resolved by the expert declarations attached to Plaintiff’s Complaint [#1], based on certain “key concessions” they purportedly make. Motion [#39] at 21. Defendant states, “[s]pecifically, the declarations confirm that the four
13 In its Reply [#53], Defendant states that, “[w]hile Arrow believes SecureNet is collaterally estopped from relitigating Judge Neureiter’s Alice step-one holding from Senstar in the present case, it is unnecessary for the Court to address the issue given the clarity on the merits, as detailed by Judge Neureiter.” Reply [#53] at 3 n.2. Given this statement, and given that the Court decides the Motion [#39] on Alice step-two grounds, the Court need not address the issue of collateral estoppel. 22
allegedly inventive concepts [Plaintiff] identified in the Senstar case are nothing more than well-understood, routine, conventional activity: (1) attribute data representing information about the sensor used to capture the sensory data; (2) weighting of the attribute data; (3) correlation of primitive events which are weighted by attributed data; and (4) the hierarchy of two or more data storage devices.” Id. Defendant’s Alice step-two argument cites only
the expert declarations attached to the Complaint [#1] and does not cite the allegations of the Complaint [#1] itself. See id. at 21-27. Although Defendant first argues in the Motion [#39] that the expert declarations attached to Plaintiff’s Complaint [#1] should be considered under Alice step two to resolve the factual issues identified in Senstar, Defendant changes course in its Reply [#53] by arguing that the declarations should not be considered. Specifically, in the Reply [#53], Defendant acknowledges that Plaintiff “goes beyond the pleadings and relies exclusively on the improper declarations to argue that three claim elements—the hierarchical storage manager, attribute data, and historical correlation over time and space—are inventive.”
Reply [#53] at 4. Perhaps this is why Defendant retracts its initial argument regarding the declarations, instead arguing in the Reply that Plaintiff’s eligibility-focused expert declarations submitted with its Response [#48] meet none of the relevant criteria for consideration on a Rule 12 motion to dismiss. Id. at 1-2. Defendant asserts that “the declarations contain factual allegations contradictory to the damning concessions cited in [Defendant’s] Motion, are conclusory, and are improperly directed to questions of law for the Court.” Id. at 2. Thus, Defendant argues, “these portions of the declarations and all references to them should be disregarded in the Court’s evaluation” of Defendant’s
Motion [#39]. Id. Defendant concludes that, “[o]nce those declarations properly are disregarded, [Plaintiff] has no argument on Alice step-two.” Id. at 4. Defendant asks the Court to disregard “portions” of the declarations, which the Court infers means the portions that are not favorable to Defendant’s argument. Id. at 2. However, even if the Court were inclined to disregard parts of the declarations, Defendant
has not specified which exact parts should be disregarded and which exact parts should be considered. Regardless, the Court finds that the declarations should be disregarded in full, for purposes of adjudicating the present Motion [#39]. In Marble Voip Partners LLC v. Zoom Video Communications, Inc., No. 22-CV-2247-JAR-ADM, 2023 WL 3055323, at *3-4 (D. Kan. Apr. 24, 2013), the court decided whether to consider an expert declaration attached to a complaint when adjudicating a Rule 12(b)(6) motion to dismiss based on purported § 101 patent ineligibility, the precise issue faced by the Court here. The Marble court decided that it should not consider the declarations for two reasons. First:
While the analysis in this case requires consideration of some highly technical concepts, the Federal Circuit has recognized that patent eligibility can be determined at the Rule 12(b)(6) stage without the aid of expert testimony. The Federal Circuit has made clear that it is the patent itself that defines the metes and bounds of intellectual property. Thus, the fact that Marble is defending against a § 101 invalidity challenge does not necessarily mean that it is authorized to introduce expert declarations at the Rule 12(b)(6) stage.
Marble, 2023 WL 3044323, at *3 (internal footnotes, citations, and quotation marks omitted). Second: Nor does the [Expert] Declaration qualify as the sort of material a court would be permitted to consider when ruling on a Rule 12(b)(6) motion to dismiss. While the Tenth Circuit has not specifically addressed this issue, other Circuit Courts of Appeal and district courts in this Circuit have held 24
that an expert declaration is not a “written instrument” within the meaning of Rule 10(c). The Court finds these holdings to be persuasive and thus exercises its discretion to disregard the [Expert] Declaration attached to the [First Amended Complaint] because it is not a “written instrument” under Fed. R. Civ. P. 10(c).
Id. at *4 (internal footnote and citation omitted). For the same reasons cited by the Marble court, the Court here finds that the expert declarations attached to Plaintiff’s Complaint [#1] should be disregarded for purposes of resolving the Motion [#39]. Because the Court does not consider the expert declarations, Defendant’s Alice step-two argument fails, given that Defendant relies solely on the declarations submitted by Plaintiff.14 Defendant also does not argue that, absent consideration of the declarations, there are no factual issues in the present case so as to allow for entry of judgment on the pleadings. In addition, Defendant does not argue that the Senstar court was incorrect in holding that factual issues barred dismissal of the case at this step. After outlining the parties’ arguments, the Senstar court concluded its Alice step-two analysis as follows: Taking guidance from the Berkheimer decision, I decline to dismiss SecureNet's Complaint under Rule 12(b)(6). At this stage of the proceedings, I must read the Complaint liberally and draw all reasonable inferences in the light most favorable to the non-movant. Whether the cited limitations of the hierarchy of storage devices, the weighing of attribute data, and the correlating of that data provide the requisite inventive concepts necessary to make Plaintiff's claims patent-eligible under § 101, depends on whether they involve more than performance of well-understood, routine,
14 The Court is aware that Plaintiff has included much of the language from the Declarations in the Complaint [#1] itself. However, the Court is not inclined to sua sponte extend Defendant’s argument, which cites only the Declarations, to the language of the Complaint [#1] itself. Doing so would require the Court to examine the cited portions of the Declarations, then independently search the Complaint [#1] to see whether the cited statements are also found there, and then determine if and how Defendant’s argument applies to whichever statements are found in the Complaint [#1]. Doing so would cause the Court to stray too far from its role as a neutral adjudicator and into the realm of advocacy, particularly here where both sides are represented by experienced counsel. 25
and conventional activities previously known to the industry. The question of whether a claim element or combination of elements is well-understood, routine and conventional to a skilled artisan in the relevant field is a question of fact. Any fact, such as this one, that is pertinent to the invalidity conclusion must be proven by clear and convincing evidence.
So, while the issue of patent eligibility is ultimately a question of law, based on the allegations here, as well as the contents of the Patents-at-issue, I cannot conclude at this early stage that there is no inventive concept present that could transform the claims such that they might be patent- eligible. Whether a particular technology is well-understood, routine, and conventional goes beyond what was simply known in the prior art. The mere fact that something is disclosed in a piece of prior art, for example, does not mean it was well-understood, routine, and conventional. It goes without saying that the Court was not a skilled artisan at the time of the patent. Therefore, while on the surface it might appear to be a close question, and an uninformed instinctual reaction might suggest that Senstar has the better side of the argument, I am unable at this point to make the necessary factual determination without additional information. In this case, just as in Aatrix Software, the question cannot be answered adversely to the patentee based on the sources properly considered on a motion to dismiss, such as the complaint, the patent, and materials subject to judicial notice.
Senstar, 2020 WL 2557625, at *12 (internal citations, brackets, and quotation marks omitted). Having thoroughly considered the Senstar court’s analysis, and in the absence of any argument by Defendant distinguishing Senstar from the present case (given that the expert declarations may not be considered), the Court finds here as well that factual issues bar a finding of patent ineligibility at this stage of the case. As Plaintiff states, “[t]he Claims include the same limitations of weighting, hierarchical storage, and correlation of historical data across time and space” as found by the Senstar court, and therefore “[t]his Court should not resolve factual disputes on a motion for judgment on the pleadings.” Response [#48] at 40 n.155. Accordingly, the Motion [#39] is denied. IV. Conclusion 26
For the foregoing reasons, IT IS HEREBY ORDERED that the Motion [#39] is DENIED.
Dated: June 5, 2023
BY THE COURT: Pet A.-M Kristen L. Mix United States Magistrate Judge